Skip to content
  1. Feb 07, 2020
  2. Feb 06, 2020
    • Thomas Woerner's avatar
      ipapwpolicy: Use global_policy if name is not set · 4dd1d25e
      Thomas Woerner authored
      If the name is not set, the policy global_policy is now used. It was needed
      before to explicitly name the global_policy. Also a check has been added
      to fail early if global_policy is used with state absent.
      
      The README for pwpolicy has been extended with an example for global_policy
      and also the description of the name variable.
      
      The test has also been extended to check a change of maxlife for
      global_policy and that global_policy can not be used with state: absent
      
      Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1797532
      4dd1d25e
  3. Feb 03, 2020
    • Rafael Guterres Jeffman's avatar
      Add missing attributes to ipasudorule. · dc0a5585
      Rafael Guterres Jeffman authored
      This patch adds the following attributes to ipasudorule:
      
          - order
          - sudooption
          - runasuser
          - runasgroup
      
      It also fixes behavior of sudocmd assigned to the the sudorule, with the
      adittion of the attributes:
      
          - allow_sudocmds
          - deny_sudocmds
          - allow_sudocmdgroups
          - deny_sudocmdgroups
      
      README-sudorule and tests have been updated to comply with the changes.
      dc0a5585
  4. Dec 16, 2019
    • Rafael Guterres Jeffman's avatar
      New vault management module. · af4e8432
      Rafael Guterres Jeffman authored
      There is a new vault management module placed in the plugins folder:
      
        plugins/modules/ipavault.py
      
      The vault module allows to ensure presence and absence of vaults, manage
      members and owner of the vault, and archive data in the vault.
      
      Here is the documentation for the module:
      
          README-vault.md
      
      New example playbooks have been added:
      
          playbooks/vault/data-archive-in-asymmetric-vault.yml
          playbooks/vault/data-archive-in-symmetric-vault.yml
          playbooks/vault/ensure-asymetric-vault-is-absent.yml
          playbooks/vault/ensure-asymetric-vault-is-present.yml
          playbooks/vault/ensure-service-vault-is-absent.yml
          playbooks/vault/ensure-service-vault-is-present.yml
          playbooks/vault/ensure-shared-vault-is-absent.yml
          playbooks/vault/ensure-shared-vault-is-present.yml
          playbooks/vault/ensure-standard-vault-is-absent.yml
          playbooks/vault/ensure-standard-vault-is-present.yml
          playbooks/vault/ensure-symetric-vault-is-absent.yml
          playbooks/vault/ensure-symetric-vault-is-present.yml
          playbooks/vault/ensure-vault-is-present-with-members.yml
          playbooks/vault/ensure-vault-member-group-is-absent.yml
          playbooks/vault/ensure-vault-member-group-is-present.yml
          playbooks/vault/ensure-vault-member-user-is-absent.yml
          playbooks/vault/ensure-vault-member-user-is-present.yml
          playbooks/vault/ensure-vault-owner-is-absent.yml
          playbooks/vault/ensure-vault-owner-is-present.yml
      
      New tests added for the module:
      
          tests/vault/test_vault.yml
      af4e8432
  5. Dec 02, 2019
    • Thomas Woerner's avatar
      ipahost: Extension to be able handle several hosts and all settings · 94b1f25b
      Thomas Woerner authored
      The ipahost management module was not able to add several hosts at once.
      Addtionally there have been settings missing.
      
      ansible_freeipa_module has been extended to provide two additional functions
      that are needed to simplify the extension of the ipahost module:
      
          gen_add_del_lists(user_list, res_list)
          encode_certificate(cert)
      
      gen_add_del_lists will generate the lists for the addition and removal of
      members using the provided user and ipa settings.
      
      encode_certificate will encode a certificate using base64 with also taking
      FreeIPA and Python versions into account.
      
      The missing settings in ipahost have been:
      
          certificate
          managedby_host
          principal
          create_keytab_[user,group,host,hostgroup]
          retrieve_keytab_[user,group,host,hostgroup]
          sshpubkey
          userclass
          auth_ind
          requires_pre_auth
          ok_as_delegate
          ok_to_auth_as_delegate
      
      The README-host.md file has been updated to provide information about the
      new settings and also the members. Also examples for the new things have
      been added.
      
      New example playbooks have been added:
      
          playbooks/host/add-host.yml
          playbooks/host/host-member-allow_create_keytab-absent.yml
          playbooks/host/host-member-allow_create_keytab-present.yml
          playbooks/host/host-member-allow_retrieve_keytab-absent.yml
          playbooks/host/host-member-allow_retrieve_keytab-present.yml
          playbooks/host/host-member-certificate-absent.yml
          playbooks/host/host-member-certificate-present.yml
          playbooks/host/host-member-managedby_host-absent.yml
          playbooks/host/host-member-managedby_host-present.yml
          playbooks/host/host-member-principal-absent.yml
          playbooks/host/host-member-principal-present.yml
          playbooks/host/host-present-with-allow_create_keytab.yml
          playbooks/host/host-present-with-allow_retrieve_keytab.yml
          playbooks/host/host-present-with-certificate.yml
          playbooks/host/host-present-with-managedby_host.yml
          playbooks/host/host-present-with-principal.yml
          playbooks/host/host-present-with-randompassword.yml
          playbooks/host/host-present.yml
          playbooks/host/hosts-member-certificate-absent.yml
          playbooks/host/hosts-member-certificate-present.yml
          playbooks/host/hosts-member-managedby_host-absent.yml
          playbooks/host/hosts-member-managedby_host-present.yml
          playbooks/host/hosts-member-principal-absent.yml
          playbooks/host/hosts-member-principal-present.yml
          playbooks/host/hosts-present-with-certificate.yml
          playbooks/host/hosts-present-with-managedby_host.yml
          playbooks/host/hosts-present-with-randompasswords.yml
      
      New tests have been added for the module:
      
          tests/host/certificate/cert1.der
          tests/host/certificate/cert1.pem
          tests/host/certificate/cert2.der
          tests/host/certificate/cert2.pem
          tests/host/certificate/cert3.der
          tests/host/certificate/cert3.pem
          tests/host/certificate/private1.key
          tests/host/certificate/private2.key
          tests/host/certificate/private3.key
          tests/host/certificate/test_host_certificate.yml
          tests/host/certificate/test_hosts_certificate.yml
          tests/host/test_host.yml
          tests/host/test_host_allow_create_keytab.yml
          tests/host/test_host_allow_retrieve_keytab.yml
          tests/host/test_host_managedby_host.yml
          tests/host/test_host_principal.yml
          tests/host/test_host_random.yml
          tests/host/test_hosts.yml
          tests/host/test_hosts_managedby_host.yml
          tests/host/test_hosts_principal.yml
      94b1f25b
  6. Nov 20, 2019
    • Thomas Woerner's avatar
      ipahost: Return generated random password · c36cb954
      Thomas Woerner authored
      The random password is only returned if random is yes and the host did
      not exist or update_password is yes.
      
      If only one host is handled by the module, the returned dict is containing
      this dict:
      
        { "randompassword": "<the host random password>" }
      
      If several hosts are handled by the module (future feature):
      
        { "<host>": { "randompassword": "<the host random password>" } }
      
      Fixes issue #134 (ipahost does not return the random password)
      c36cb954
    • Thomas Woerner's avatar
      ipauser: Return generated random password · b5f20922
      Thomas Woerner authored
      The random password is only returned if random is yes and user did not exist
      or update_password is yes.
      
      If only one user is handled by the module, the returned dict is containing
      this dict:
      
        { "randompassword": "<the user random password>" }
      
      If several users are handled by the module:
      
        { "<user>": { "randompassword": "<the user random password>" } }
      
      This is related to issue #134 (ipahost does not return the random password)
      b5f20922
  7. Nov 09, 2019
  8. Nov 08, 2019
  9. Nov 07, 2019
    • Rafael Guterres Jeffman's avatar
      New sudorule (Sudo Rule) management module · 2f621608
      Rafael Guterres Jeffman authored
      There is a new sudorule (Sudo Rule) management module placed in the plugins
      folder:
      
        plugins/modules/ipasudorule.py
      
      The sudorule module allows to ensure presence and absence of Sudo Rules.
      
      Here is the documentation for the module:
      
        README-sudorule.md
      
      New example playbooks have been added:
      
          playbooks/sudorule/ensure-sudorule-host-member-is-absent.yml
          playbooks/sudorule/ensure-sudorule-host-member-is-present.yml
          playbooks/sudorule/ensure-sudorule-hostgroup-member-is-absent.yml
          playbooks/sudorule/ensure-sudorule-hostgroup-member-is-present.yml
          playbooks/sudorule/ensure-sudorule-is-absent.yml
          playbooks/sudorule/ensure-sudorule-is-disabled.yml
          playbooks/sudorule/ensure-sudorule-is-enabled.yml
          playbooks/sudorule/ensure-sudorule-is-present.yml
          playbooks/sudorule/ensure-sudorule-sudocmd-is-absent.yml
          playbooks/sudorule/ensure-sudorule-sudocmd-is-present.yml
      
      New tests added for the module:
      
        tests/hbacrule/test_sudorule.yml
      2f621608
    • Thomas Woerner's avatar
      ipahostgroup: Fix changed flag, support IPA 4.6 on RHEL-7, new test cases · 0e64c80c
      Thomas Woerner authored
      The changed flag returned by ipahostgroup calls have not always been correct.
      The use of the module with IPA version 4.6 on RHEL-7 resulted in encoding
      errors. All this has been fixed.
      
      Addtitionally new test cases have been added to make sure that the issues
      are solved.
      0e64c80c
  10. Nov 05, 2019
    • Thomas Woerner's avatar
      New hbacrule (HBAC Rule) management module · d36d25d6
      Thomas Woerner authored
      There is a new hbacrule (HBAC Rule) management module placed in the plugins
      folder:
      
        plugins/modules/ipahbacrule.py
      
      The hbacrule module allows to ensure presence and absence of HBAC Rules.
      
      Here is the documentation for the module:
      
        README-hbacrule.md
      
      New example playbooks have been added:
      
        playbooks/hbacrule/ensure-hbarule-allhosts-absent.yml
        playbooks/hbacrule/ensure-hbarule-allhosts-disabled.yml
        playbooks/hbacrule/ensure-hbarule-allhosts-enabled.yml
        playbooks/hbacrule/ensure-hbarule-allhosts-present.yml
        playbooks/hbacrule/ensure-hbarule-allhosts-server-member-absent.yml
        playbooks/hbacrule/ensure-hbarule-allhosts-server-member-present.yml
      
      New tests added for the module:
      
        tests/hbacrule/test_hbacrule.yml
      d36d25d6
  11. Oct 30, 2019
    • Thomas Woerner's avatar
      ipagroup: Fix changed flag, new test cases · ff9ce6b8
      Thomas Woerner authored
      The changed flag returned by ipagroup calls have not been correct. This
      change fixes this. Addtitionally new test cases have been added to make
      sure that the changed flag is correct.
      ff9ce6b8
  12. Oct 25, 2019
    • Thomas Woerner's avatar
      New hbacsvcgroup (HBAC Service Group) management module · 4b9860e1
      Thomas Woerner authored
      There is a new hbacsvcgroup (HBAC Service Group) management module placed
      in the plugins folder:
      
        plugins/modules/ipahbacsvcgroup.py
      
      The hbacsvc module allows to ensure presence and absence of HBAC Service
      Groups.
      
      Here is the documentation for the module:
      
        README-hbacsvcgroup.md
      
      New example playbooks have been added:
      
        playbooks/hbacsvcgroup/ensure-hbacsvcgroup-absent.yml
        playbooks/hbacsvcgroup/ensure-hbacsvcgroup-member-absent.yml
        playbooks/hbacsvcgroup/ensure-hbacsvcgroup-member-present.yml
        playbooks/hbacsvcgroup/ensure-hbacsvcgroup-present.yml
      
      New tests added for the module:
      
         tests/hbacsvcgroup/test_hbacsvcgroup.yml
      4b9860e1
  13. Oct 24, 2019
    • Thomas Woerner's avatar
      New hbacsvc (HBAC Service) management module · 42eaadfb
      Thomas Woerner authored
      There is a new hbacsvc (HBAC Service) management module placed in the plugins
      folder:
      
        plugins/modules/ipahbacsvc.py
      
      The hbacsvc module allows to ensure presence and absence of HBAC Services.
      
      Here is the documentation for the module:
      
        README-hbacsvc.md
      
      New example playbooks have been added:
      
        playbooks/hbacsvc/ensure-hbacsvc-absent.yml
        playbooks/hbacsvc/ensure-hbacsvc-present.yml
      
      New tests added for pwpolicy:
      
        tests/hbacsvc/test_hbacsvc.yml
      42eaadfb
  14. Oct 22, 2019
    • Thomas Woerner's avatar
      New pwpolicy management module · b3fd3a51
      Thomas Woerner authored
      There is a new pwpolicy management module placed in the plugins folder:
      
        plugins/modules/ipapwpolicy.py
      
      The pwpolicy module allows to ensure presence and absence of pwpolicies for
      groups.
      
      Here is the documentation for the module:
      
        README-pwpolicy.md
      
      New example playbooks have been added:
      
        playbooks/pwpolicy/pwpolicy_absent.yml
        playbooks/pwpolicy/pwpolicy_present.yml
      
      New tests added for pwpolicy:
      
        tests/pwpolicy/test_pwpolicy.yml
      b3fd3a51
    • Rafael Guterres Jeffman's avatar
      New sudocmdgroup management module. · fce3935d
      Rafael Guterres Jeffman authored
      
      
      There is a new sudocmdgroup management module placed in the plugins folder:
      
      plugins/modules/ipasudocmdgroup.py
      
      The sudocmdgroup module allows to add or remove sudo command groups..
      
      The sudocmdgroup module is as compatible as possible to the Ansible upstream
      ipa_sudocmdgroup module, and additionally offers to ensure member presence
      and absence.
      
      Here is the documentation for the module:
      
        README-sudocmdgroup.md
      
      New example playbooks have been added:
      
        playbooks/sudocmd/ensure-sudocmdgroup-is-absent.yml
        playbooks/sudocmd/ensure-sudocmdgroup-is-present.yml
        playbooks/sudocmd/ensure-sudocmd-is-absent-in-sudocmdgroup.yml
        playbooks/sudocmd/ensure-sudocmd-is-present-in-sudocmdgroup.yml
      
      A test playbook is provided in:
      
        tests/sudocmdgroup/test_sudocmdgroup.yml
      
      Signed-off-by: default avatarRafael Guterres Jeffman <rjeffman@redhat.com>
      fce3935d
    • Rafael Guterres Jeffman's avatar
      New sudocmd management module. · 5d962c06
      Rafael Guterres Jeffman authored
      
      
      There is a new sudocmd management module placed in the plugins folder:
      
        plugins/modules/ipasudocmd.py
      
      The sudocmd module allows to add or remove sudo commands.
      
      The sudocmd module is as compatible as possible to the Ansible upstream
      ipa_sudocmd module.
      
      Here is the documentation for the module:
      
        README-sudocmd.md
      
      New example playbooks have been added:
      
        playbooks/sudocmd/ensure-sudocmd-is-absent.yml
        playbooks/sudocmd/ensure-sudocmd-is-present.yml
      
      Signed-off-by: default avatarRafael Guterres Jeffman <rjeffman@redhat.com>
      5d962c06
  15. Oct 21, 2019
    • Thomas Woerner's avatar
      ipauser: User module extension · 40713e71
      Thomas Woerner authored
      The ipauser module now supports all user settings and additionally to ensure
      the presence of several users with the new users setting. The users setting
      can also be used with other states, but it has to be limited to only contain
      the name of the users.
      
      There updated user management module is placed in the plugins folder:
      
        plugins/modules/ipauser.py
      
      The user module now additionally allows to handle these user settings:
      
        initials
        principalexpiration
        random
        city
        userstate
        postalcode
        mobile
        pager
        fax
        orgunit
        manager
        carlicense
        sshpubkey
        userauthtype
        userclass
        radius
        radiususer
        departmentnumber
        employeenumber
        employeetype
        preferredlanguage
        certificate
        certmapdata
        noprivate
        nomembers
      
      Here is the updated documentation for the module:
      
        README-user.md
      
      New example playbooks have been added:
      
        playbooks/user/user_certificate_absent.yml
        playbooks/user/user_certificate_present.yml
        playbooks/user/user_present.yml
        playbooks/user/users_absent.yml
        playbooks/user/users_certificate_absent.yml
        playbooks/user/users_certificate_present.yml
        playbooks/user/users_present.yml
        plugins/modules/ipauser.py
      
      New tests added for ipauser:
      
        tests/user/certificate/cert1.der
        tests/user/certificate/cert1.pem
        tests/user/certificate/cert2.der
        tests/user/certificate/cert2.pem
        tests/user/certificate/cert3.der
        tests/user/certificate/cert3.pem
        tests/user/certificate/private1.key
        tests/user/certificate/private2.key
        tests/user/certificate/private3.key
        tests/user/certificate/test_user_certificate.yml
        tests/user/certificate/test_users_certificate.yml
        tests/user/certmapdata/test_user_certmapdata.yml
        tests/user/certmapdata/test_user_certmapdata_issuer_subject.yml
        tests/user/certmapdata/test_users_certmapdata.yml
        tests/user/test_user.yml
        tests/user/test_users.yml
        tests/user/test_users_absent.yml
        tests/user/test_users_invalid_cert.yml
        tests/user/test_users_present.yml
        tests/user/test_users_present_slice.yml
        tests/user/users_absent.json
        tests/user/users_absent.sh
        tests/user/users_present.json
        tests/user/users_present.sh
      40713e71
  16. Sep 27, 2019
    • Thomas Woerner's avatar
      tests/external-signed-ca tests: Fix external-ca.sh to use proper serials · 2a197cc7
      Thomas Woerner authored
      The serial numbers have not been set for the creation of the CA and also
      to sign the request. Because of this the local time has been used, which
      resulted sometimes in the use of the same time stamp for the CA and the
      signing reuqest. The import failed then with same issuer and serial number
      error.
      
      The cat to generate the chain.crt has been replaces with openssl x509 calls.
      
      Some comments have also been added.
      
      The script in external-signed-ca-with-manual-copy has been replaced with a
      link to the external-signed-ca-with-automatic-copy directory.
      2a197cc7
  17. Sep 25, 2019
  18. Jun 27, 2019
    • Thomas Woerner's avatar
      New tests folder · c708ef78
      Thomas Woerner authored
      There are currently only external signed CA tests:
      
      external-signed-ca-with-automatic-copy
      external-signed-ca-with-manual-copy
      c708ef78
Loading